Research paper powerpoint presentation for public viewing


Published on

for blackboard discussion

Published in: Technology
1 Comment
  • Essay writing is really very hard for students and many students are really stressed to write it. So finding a best essay writing format is not easy. Anyway you can check any essay writing services and they can help you to find a good format to write the essay. I can recommend a site that has helped me. It's called Good luck!
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Research paper powerpoint presentation for public viewing

  1. 1. The Effects of Malware on Computers<br />ANONYMOUS<br />English 151 WC<br />April 26th 2011<br />
  2. 2. Subtopic #1 – “Introduction of Malware”<br />Have you ever had this happen to you?<br />A sudden decrease in your operating system with no explanation?<br />Pop ups and ads even though you don’t have any web browser open?<br />Unauthorized programs are being installed onto your computer?<br />You notice that your computer is using more of it’s resources than usual?<br />If so – you might be a victim of malware!<br />
  3. 3. Subtopic #1 – “Introduction of Malware”<br />So what is malware, anyway?<br />Software designed to cause harm or gain unauthorized access to one’s computer.<br />Also known as:<br />Viruses<br />Spyware<br />Bloatware<br />Botnets<br />Rootkits<br />Scareware<br />
  4. 4. Subtopic #1 – “Introduction of Malware”<br />History of Malware<br />1970 - 1990<br />History of Malware<br />1990-present day<br />1971 – “Creeper Virus” is introduced.<br />1974 – The “Rabbit” Virus.<br />1981 – “Elk Cloner” the first major virus for the Apple II personal computer.<br />1987 – The “Vienna Virus” is the first virus that actually destroys data.<br />1990 – “Chameleon” becomes the first virus that can purposely hide itself from it’s victim.<br />1998 – “HLLP.DeTroi” becomes the first virus to relay compromised passwords to the creators.<br />2001 – “E-mail and Websites” become the number one “honey pot” for malware.<br />2003 – “Slammer” infects the actual memory of computer systems to decrease the performance.<br />
  5. 5. Subtopic #2 – “Effects of Malware on Computers in the Present Day”<br />“As computers become more advanced in what they are capable of, the effects of malware is always changing to fit the agenda of its creator.”<br />
  6. 6. Subtopic #2 – “Effects of Malware on Computers in the Present Day”<br />Types of Malware:<br />Insert info here.<br />Insert info here.<br />Insert info here.<br />Insert info here.<br />Insert info here.<br />
  7. 7. Subtopic #3 – “The Victims of Malware”<br />What are users doing to prevent malware from gaining unauthorized access to their computers?<br />What can you do?<br />
  8. 8. Subtopic #3 – “Future of Malware”<br />What is the current growing concern for the effects of malware? <br />What might be in store for the future, and what can we do to protect ourselves?<br />
  9. 9. Subtopic #3 – “Conclusion”<br />What do I think?<br />